junquera / c-lockLinks
A TOTP based port knocking service. Every time slot, it generates a sequence of ports that must be knocked (in a correct order) before the final port (it have been designed for protecting a SSH service) becames opened.
☆31Updated 4 years ago
Alternatives and similar repositories for c-lock
Users that are interested in c-lock are comparing it to the libraries listed below
Sorting:
- a distributed PGP keyserver project based on the dat protocol☆91Updated 3 years ago
- End-to-end encryption plugin for Mattermost☆71Updated last year
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Decentralized One Time Passwords☆12Updated 3 years ago
- a scalable collaborative document editor with CRDT, P2P and E2EE☆140Updated 2 years ago
- Convert HTTP Archive (HAR) -> Web Archive (WARC) format☆55Updated 7 years ago
- JavaScript implementation of Frank Denis' (@jedisct1) minisign tool.☆83Updated 3 years ago
- SSB Drive - a decentralized file system over Secure Scuttlebutt☆71Updated 7 years ago
- Safe Base64 encoding/decoding in pure JavaScript.☆18Updated 9 months ago
- Nodes used to facilitate workshops and demos for mesh networking☆35Updated 7 years ago
- DHT in the web browser with peer-relay and bittorrent-dht☆61Updated 8 years ago
- Decentralized web Gateway for Internet Archive☆21Updated 6 years ago
- rweather/noise-c compiled to WebAssembly using Emscripten and optimized for small size☆95Updated 5 years ago
- ☆27Updated last year
- A simple way to generate password-proteceted secrets from a FIDO2 authenticator with the hmac-secret extension☆53Updated 3 years ago
- 🌃 Start and control a Tor instance.☆12Updated 3 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Updated 6 years ago
- A tool for running an application in an isolated network namespace, with external network access only through a SOCKS proxy.☆27Updated last year
- PGP key poisoner☆37Updated 6 years ago
- connect peers to each other using secret-handshakes☆93Updated 2 years ago
- a more secure way to force programs to exclusively use tor network☆206Updated 3 years ago
- Simple end-to-end encrypted, secure channels using Noise Protocol Framework and libsodium secretstream☆147Updated 3 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 5 years ago
- Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦☆63Updated 6 years ago
- A Bloom filter & Golang server for checking passwords against the "Have I Been Pwned 2.0" password database.☆52Updated 3 years ago
- Fast, robust, standards-compliant MIME decoder. Ships with extensive tests and fuzz tests.☆64Updated 5 years ago
- Authentication protocol that's decentralized, secure, private and compatible with nearly everything out there.☆22Updated 8 years ago
- Hide secret information in typographical errors☆32Updated 10 years ago
- Dynamic SVG generation using Cassowary constraints☆41Updated 6 years ago
- Explore the Tor network☆87Updated 2 years ago